default search action
Journal of Computer Security, Volume 29
Volume 29, Number 1, 2021
- Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Chuck Anderson:
Directed adversarial sampling attacks on phishing detection. 1-23 - Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations. 25-50 - Federico Griscioli, Maurizio Pizzonia:
USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems. 51-76 - Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia L. Luccio, Mauro Tempesta, Lorenzo Veronese:
FWS: Analyzing, maintaining and transcompiling firewalls. 77-134
Volume 29, Number 2, 2021
- Sonam Mittal, K. R. Ramkumar:
Research perspectives on fully homomorphic encryption models for cloud sector. 135-160 - Zhiwu Xu, Hongxu Chen, Alwen Tiu, Yang Liu, Kunal Sareen:
A permission-dependent type system for secure information flow analysis. 161-228 - Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang:
Publicly auditable conditional blind signatures. 229-271
Volume 29, Number 3, 2021
- Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-based remote user authentication from reusable fuzzy signature. 273-298 - Abraão Aires Urquiza, Musab A. Alturki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
Resource and timing aspects of security protocols. 299-340 - Ghandi Hessam, Ghassan Saba, M. Iyad Alkhayat:
A new approach for detecting violation of data plane integrity in Software Defined Networks. 341-358 - Sonam Mittal, K. R. Ramkumar:
Research perspectives on fully homomorphic encryption models for cloud sector. 359
Volume 29, Number 4, 2021
- Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Permissive runtime information flow control in the presence of exceptions. 361-401 - Jianguo Jiang, Boquan Li, Baole Wei, Gang Li, Chao Liu, Weiqing Huang, Meimei Li, Min Yu:
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. 403-421 - Md. Morshed Alam, Weichao Wang:
A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement. 423-446
Volume 29, Number 5, 2021
- Guangjun Li, Preetpal Sharma, Lei Pan, Sutharshan Rajasegarar, Chandan K. Karmakar, Nicholas Charles Patterson:
Deep learning algorithms for cyber security applications: A survey. 447-471 - Andronicus Ayobami Akinyelu:
Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques. 473-529 - Himani Sharma, Navdeep Kanwal:
Video interframe forgery detection: Classification, technique & new dataset. 531-550
Volume 29, Number 6, 2021
- Ben Smyth:
Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios. 551-611 - Mina Sheikhalishahi, Ischa Stork, Nicola Zannone:
Privacy-preserving policy evaluation in multi-party access control. 613-650
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.